Effective Date: October 1, 2017
Updated: October 9, 2019
CloudVisit may collect the following personal or Personally Identifiable Information (“PII”) from you:
CloudVisit may also collect the following additional information from you:
CloudVisit uses this personal or personally identifiable information to:
You further authorize the following specific uses:
We use a proprietary reporting system to log when users view specific pages or take specific actions within Ericsson Remote Access. This information is only shared with Ericsson, Inc. in-order to improve system performance.
CloudVisit stores and protects your personal or personally identifiable information in the following manner:
Your personal information is stored and processed on computers and servers in the United States, European Union and India to which only a limited number of individuals have access and, through your use of Ericsson Remote Access, you acknowledge the processing and storage of your personal and personally identifiable information. You understand that CloudVisit may continue to store your information for a predetermined time after you cease use of the service or disable your account as defined in retention rules and limited by the agreement between CloudVisit and Ericsson.
CloudVisit uses commercially reasonable efforts and standard technology, such as Malware scanning, and encryption to store and help prevent against the unauthorized disclosure of your information. Though it undertakes commercially reasonable efforts to protect your information, no website, software, or online service is completely safe.
To protect your Personal Information, CloudVisit uses specific security measures, such Secure Sockets Layer (SSL) protocol, which encrypts information you input at 128-bit strength. This is denoted in most web-browsers by a small padlock appearing on the bottom bar of the window and the address of the window changing from http:// to https://, meaning a secure connection.
We retain files, including audio and video recordings, screen captures, checklists, images, and exports, for two years. During this two-year period, CloudVisit users with host, editor, customer and supplier access permissions will have the ability to review retained personal information.
After the two year period we retain files for an additional year during which time only system administrators will have the ability to review and/or restore files. In the case where an administrator restores a file, personal data will be available for host, editor, customer and supplier review for a 30-day period prior to being moved back into restricted view.
CloudVisit does not collect or share any of your personal information with any third parties for direct marketing purposes. CloudVisit may share your personal or personally identifiable information with third parties in the following circumstances:
You understand and agree that CloudVisit may share your information with other users that have been pre-approved or approved by Ericsson to complete the services offered.
You may stop CloudVisit from collecting your personal or personally identifiable information by ceasing your use of Ericsson Remote Access. You may contact CloudVisit with any requests regarding your information, but CloudVisit reserves the right to act or not act upon such requests.
Purchase or sale of the Website and/or other assets
Your obligations when using Ericsson Remote Access
Inform CloudVisit of any changes to your personal or personally identifiable information, and protect the security of your Username, password, and your personal or personally identifiable information.
Third party services and third party links
CloudVisit may include or offer third party links, products, and/or services on Ericsson Remote Access and provide third party links to the same. These third party Websites have separate and independent privacy policies. CloudVisit has no responsibility or liability for the content and activities of such third parties and their technology systems. We encourage you to read carefully the privacy policies of all such third party Websites or systems. We seek to protect the integrity of Ericsson Remote Access and therefore welcome any feedback about any such third party websites or systems.
The Website is not intended for or directed to Users under the age of 13, and CloudVisit does not knowingly or intentionally collect Personal Information from children under the age of 13 or other minors. Where appropriate, CloudVisit takes reasonable measures to determine that Users are adults of legal age and to inform minors not to submit such information to the Website or in response to advertisements. If you are concerned that personal or personally identifiable information may have been inadvertently provided to or collected by Aurora, please contact us immediately so appropriate steps may be taken to remove such information from the CloudVisit database.
Fair Information Practice Principles (“FIPPs”)
The Website is in compliance with the Federal Trade Commission’s FIPPs. In the event of a data breach, we take responsive action by notifying you via e-mail within seven (7) business days of any such breach. Specifically, we adhere to the Individual Redress Principle, which requires individuals to have the right to legally pursue enforceable rights against data collectors and processors who fail to adhere to the law.
EU/US Privacy Shield Framework:
CloudVisit complies with the EU-U.S. Privacy Shield Framework as set forth by the U.S. Department of Commerce regarding the collection, use, and retention of personal information transferred from the European Union to the United States.
CloudVisit certifies that it adheres to the Privacy Shield Principles of notice, choice, onward transfer, security, data integrity, access, and enforcement for personal data submitted by our customers in participating European countries through the Services, and our Privacy Shield certification will be available here. We may also process personal data our customers submit relating to individuals in the EU via other compliance mechanisms, including data processing agreements based on the EU Standard Contractual Clauses.
We process the data so that our customers can effectively manage the utilization of the software products they pay for. In providing these Services, we process data our customers submit to the Services or instruct us to process on their behalves in connection with the Services ("Customer Data"). While our customers decide what data to submit, Customer Data typically includes profile information and communications between users or among groups of users (e.g., channels), including message text, files, comments, and links.
Purposes of Data Processing
We process Customer Data submitted by customers for the purpose of providing the Services to customers. To fulfill these purposes, we may access data to provide the Services, to prevent or address service or technical problems, to respond to customer support matters, to follow the instructions of our customer who submitted the data, or in response to contractual requirements with our customers.
Third Parties with Whom We May Share Customer Data
We use a limited number of third party providers to assist us in providing the Services to our customers. As of the date hereof, these third party providers perform technical operations such as database monitoring, data storage and hosting services and customer support software tools. These third parties may access, process or store personal data in the course of providing these services, but based on our instructions only.
If we receive personal data subject to our certification under the Privacy Shield and then transfer it to a third-party service provider acting as an agent on our behalf, we have certain liability under the Privacy Shield if both (i) the agent processes the personal data in a manner inconsistent with the Privacy Shield and (ii) we are responsible for the event giving rise to the damage.
Questions or Complaints
If you are a resident of a European country participating in the Privacy Shield and you believe we maintain your personal data within the scope of this Privacy Shield certification, you may direct any questions or complaints concerning our Privacy Shield compliance to email@example.com or at our mailing address:
We will work with you to resolve your issue.
If you are a resident of a European country participating in Privacy Shield and you have not received timely response to your concern, or we have not addressed your concern to your satisfaction, you may seek further assistance, at no cost to you, from JAMS (formerly known as “Judicial Arbitration and Mediation Services”), which is an independent dispute resolution body in the United States. JAMS maintains a website at https://www.jamsadr.com .
We also commit to cooperate with competent EU data protection authorities (DPAs) with regard to our customers end users’ human resources data transferred from a European country participating in the Privacy Shield in the context of the employment relationship.
You may also be able to invoke binding arbitration for unresolved complaints but prior to initiating such arbitration, a resident of a European country participating in the Privacy Shield must first: (1) contact us and afford us the opportunity to resolve the issue; (2) seek assistance from JAMS; and (3) contact the U.S. Department of Commerce (either directly or through a European Data Protection Authority) and afford the Department of Commerce time to attempt to resolve the issue. If such a resident invokes binding arbitration, each party shall be responsible for its own attorney’s fees. Please be advised that, pursuant to the Privacy Shield, the arbitrator(s) may only impose individual-specific, non-monetary, equitable relief necessary to remedy any violation of the Privacy Shield Principles with respect to the resident.
U.S. Federal Trade Commission Enforcement
Our Privacy Shield compliance is subject to the investigatory and enforcement powers of the U.S. Federal Trade Commission (FTC).
Right of Access
Requirement to Disclose
We may disclose personal data when we have a good-faith belief that such action is necessary to: conform to legal requirements or to respond to lawful requests by public authorities, including to meet national security or law enforcement requirements; or to enforce our contractual obligations.
Contact and Notices